Search results
Jump to navigation
Jump to search
- ==topics== ...ompromised, the attacker may want to install some kind of backdoor to have further access4 KB (650 words) - 12:32, 13 June 2005
- However, note that much of the discussion on these topics is misleading because terms are used without precision. Part of this confus5 KB (725 words) - 05:10, 31 August 2005
- ...iple RF channels. In combination with realistic radio propagation models a further increase in the throughput is observed due to the opportunistic feature of For a list of currently available thesis topics see [http://sar.informatik.hu-berlin.de/research/thesis_proposals.htm]4 KB (532 words) - 18:33, 9 November 2006
- = Topics = = Further Information =5 KB (656 words) - 19:59, 4 February 2006
- * Further issues For a list of currently available thesis topics see [http://sar.informatik.hu-berlin.de/research/thesis_proposals.htm]6 KB (1,036 words) - 09:40, 27 March 2006
- This is a list of possible topics for scientific work ("Dissertationen", "Diplom"- or "Studienarbeiten"). Som ...ntrol algorithm, which reduces the transmission rate upon packet losses. A further problem seem to be inefficient retransmission control and considerable over9 KB (1,371 words) - 23:21, 30 August 2008
- ...e public towards an entity. Reputation of an entity can vary for different topics and for different people. = Further information =10 KB (1,629 words) - 11:50, 26 April 2006